News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

The right strategy after a data loss
The right strategy after a data loss KI-MS

Companies around the world face numerous threats. International studies also show this. A study by Arcserve shows that 76 percent of companies have suffered a serious data loss. In this context, 83 percent described downtime of 12 hours or less as acceptable. 10 tips for a successful business continuity plan. As an Arcserve study shows, only 52 percent of affected companies were able to recover from their data loss in 12 hours or less. Although 95 percent of companies said they had a disaster recovery plan, only a small…

Read more

Insufficient collaboration within the company increases cyber risk
Insufficient collaboration within the company increases cyber risk

Poor internal communication, unclear responsibilities and a heterogeneous tool landscape make cyber risk management in companies more difficult. The requirements for an effective risk management of the external attack surface, which a company offers via IT assets accessible from the Internet, and the real situation in companies diverge widely. This is the conclusion of a thought leadership report prepared by the analyst firm Forrester and commissioned by CyCognito, market leader for External Attack Surface Risk Management (EASM). A total of 304 security and IT decision-makers in the USA, Germany, France, Great Britain and Canada, who are also responsible for risk assessment within the company, were surveyed.

Read more

Messages, video and phone with end-to-end encryption
Messages, video and phone with end-to-end encryption

Ring Central wants to offer more communication security and fewer compliance risks with end-to-end encryption (E2EE) in its products. E2EE was already integrated in video communication. Now also for message and telephone to be GDPR compliant. RingCentral introduces End-to-End Encryption (E2EE) support to RingCentral MVP, which in the future will include not only video but also message and phone. E2EE technology prevents unauthorized third parties from gaining access to users' communication content. For security-conscious companies, the solution offers an even higher level of security and data protection for confidential communication as well as protection against...

Read more

Federal authorities communicate in a quantum-secure manner 
B2B Cyber ​​Security ShortNews

In Bonn, two German federal authorities communicated in a quantum-secure manner for the first time. The QuNET initiative uses the latest quantum technology to protect communication systems against the cyber attacks of tomorrow. The test route between the Bonn headquarters of the Federal Ministry of Education and Research (BMBF) and the Federal Office for Information Security (BSI), which was set up on August 10 as part of the QuNET initiative, connected Federal Research Minister Anja Karliczek with BSI Vice President Gerhard Schabhüser in a video conference . State-of-the-art quantum technology for communication The QuNET initiative uses state-of-the-art quantum technology to protect communication systems against the cyber attacks of tomorrow. The focus of the initiative is ...

Read more

Crisis communication in the event of data theft
Crisis communication in the event of data theft

Data disaster Data theft - this is how crisis communication works. The nightmare for every company: a cyber attack resulted in a data theft. How can this worst-case scenario, not to mention the financial and material damage, be overcome in terms of communication without losing customers or shareholders? In a discussion, Sophos and Associate Professor Jason RC Nurse from the University of Kent developed important answers and a guide to this essential question. When the IT security meltdown has occurred and cyber criminals have been able to steal large amounts of company data, forensic questions such as uncovering the gateways and ...

Read more

Danger: home office & emails
Email company marketing

In times of home office in particular, emails as corporate communication are always a cyber threat. Here is an overview of the five worst mistakes in email communication. In view of the increasing number of corona cases, a “second wave” in autumn is a likely scenario. It is still unclear what containment measures will be taken this time. The first lockdown phase showed that efficient communication with and between employees is a decisive success factor for companies. If it takes place via e-mail, it is often slowed down by errors that can be easily avoided. We have compiled the most important ones for you here. 1….

Read more